test_controller.c 47 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480
  1. /* Copyright (c) 2015-2017, The Tor Project, Inc. */
  2. /* See LICENSE for licensing information */
  3. #define CONTROL_PRIVATE
  4. #include "or.h"
  5. #include "bridges.h"
  6. #include "control.h"
  7. #include "entrynodes.h"
  8. #include "hs_common.h"
  9. #include "networkstatus.h"
  10. #include "rendservice.h"
  11. #include "routerlist.h"
  12. #include "test.h"
  13. #include "test_helpers.h"
  14. static void
  15. test_add_onion_helper_keyarg_v3(void *arg)
  16. {
  17. int ret, hs_version;
  18. void *pk_ptr = NULL;
  19. char *key_new_blob = NULL;
  20. char *err_msg = NULL;
  21. const char *key_new_alg = NULL;
  22. (void) arg;
  23. /* Test explicit ED25519-V3 key generation. */
  24. ret = add_onion_helper_keyarg("NEW:ED25519-V3", 0, &key_new_alg,
  25. &key_new_blob, &pk_ptr, &hs_version,
  26. &err_msg);
  27. tt_int_op(ret, OP_EQ, 0);
  28. tt_int_op(hs_version, OP_EQ, HS_VERSION_THREE);
  29. tt_assert(pk_ptr);
  30. tt_str_op(key_new_alg, OP_EQ, "ED25519-V3");
  31. tt_assert(key_new_blob);
  32. tt_ptr_op(err_msg, OP_EQ, NULL);
  33. tor_free(pk_ptr); pk_ptr = NULL;
  34. tor_free(key_new_blob);
  35. /* Test discarding the private key. */
  36. ret = add_onion_helper_keyarg("NEW:ED25519-V3", 1, &key_new_alg,
  37. &key_new_blob, &pk_ptr, &hs_version,
  38. &err_msg);
  39. tt_int_op(ret, OP_EQ, 0);
  40. tt_int_op(hs_version, OP_EQ, HS_VERSION_THREE);
  41. tt_assert(pk_ptr);
  42. tt_ptr_op(key_new_alg, OP_EQ, NULL);
  43. tt_ptr_op(key_new_blob, OP_EQ, NULL);
  44. tt_ptr_op(err_msg, OP_EQ, NULL);
  45. tor_free(pk_ptr); pk_ptr = NULL;
  46. tor_free(key_new_blob);
  47. /* Test passing a key blob. */
  48. {
  49. /* The base64 key and hex key are the same. Hex key is 64 bytes long. The
  50. * sk has been generated randomly using python3. */
  51. const char *base64_sk =
  52. "a9bT19PqGC9Y+BmOo1IQvCGjjwxMiaaxEXZ+FKMxpEQW"
  53. "6AmSV5roThUGMRCaqQSCnR2jI1vL2QxHORzI4RxMmw==";
  54. const char *hex_sk =
  55. "\x6b\xd6\xd3\xd7\xd3\xea\x18\x2f\x58\xf8\x19\x8e\xa3\x52\x10\xbc"
  56. "\x21\xa3\x8f\x0c\x4c\x89\xa6\xb1\x11\x76\x7e\x14\xa3\x31\xa4\x44"
  57. "\x16\xe8\x09\x92\x57\x9a\xe8\x4e\x15\x06\x31\x10\x9a\xa9\x04\x82"
  58. "\x9d\x1d\xa3\x23\x5b\xcb\xd9\x0c\x47\x39\x1c\xc8\xe1\x1c\x4c\x9b";
  59. char *key_blob = NULL;
  60. tor_asprintf(&key_blob, "ED25519-V3:%s", base64_sk);
  61. tt_assert(key_blob);
  62. ret = add_onion_helper_keyarg(key_blob, 1, &key_new_alg,
  63. &key_new_blob, &pk_ptr, &hs_version,
  64. &err_msg);
  65. tor_free(key_blob);
  66. tt_int_op(ret, OP_EQ, 0);
  67. tt_int_op(hs_version, OP_EQ, HS_VERSION_THREE);
  68. tt_assert(pk_ptr);
  69. tt_mem_op(pk_ptr, OP_EQ, hex_sk, 64);
  70. tt_ptr_op(key_new_alg, OP_EQ, NULL);
  71. tt_ptr_op(key_new_blob, OP_EQ, NULL);
  72. tt_ptr_op(err_msg, OP_EQ, NULL);
  73. tor_free(pk_ptr); pk_ptr = NULL;
  74. tor_free(key_new_blob);
  75. }
  76. done:
  77. tor_free(pk_ptr);
  78. tor_free(key_new_blob);
  79. tor_free(err_msg);
  80. }
  81. static void
  82. test_add_onion_helper_keyarg_v2(void *arg)
  83. {
  84. int ret, hs_version;
  85. void *pk_ptr = NULL;
  86. crypto_pk_t *pk = NULL;
  87. const char *key_new_alg = NULL;
  88. char *key_new_blob = NULL;
  89. char *err_msg = NULL;
  90. char *encoded = NULL;
  91. char *arg_str = NULL;
  92. (void) arg;
  93. /* Test explicit RSA1024 key generation. */
  94. ret = add_onion_helper_keyarg("NEW:RSA1024", 0, &key_new_alg, &key_new_blob,
  95. &pk_ptr, &hs_version, &err_msg);
  96. tt_int_op(ret, OP_EQ, 0);
  97. tt_int_op(hs_version, OP_EQ, HS_VERSION_TWO);
  98. tt_assert(pk_ptr);
  99. tt_str_op(key_new_alg, OP_EQ, "RSA1024");
  100. tt_assert(key_new_blob);
  101. tt_ptr_op(err_msg, OP_EQ, NULL);
  102. /* Test "BEST" key generation (Assumes BEST = RSA1024). */
  103. crypto_pk_free(pk_ptr); pk_ptr = NULL;
  104. tor_free(key_new_blob);
  105. ret = add_onion_helper_keyarg("NEW:BEST", 0, &key_new_alg, &key_new_blob,
  106. &pk_ptr, &hs_version, &err_msg);
  107. tt_int_op(ret, OP_EQ, 0);
  108. tt_int_op(hs_version, OP_EQ, HS_VERSION_TWO);
  109. tt_assert(pk_ptr);
  110. tt_str_op(key_new_alg, OP_EQ, "RSA1024");
  111. tt_assert(key_new_blob);
  112. tt_ptr_op(err_msg, OP_EQ, NULL);
  113. /* Test discarding the private key. */
  114. crypto_pk_free(pk_ptr); pk_ptr = NULL;
  115. tor_free(key_new_blob);
  116. ret = add_onion_helper_keyarg("NEW:BEST", 1, &key_new_alg, &key_new_blob,
  117. &pk_ptr, &hs_version, &err_msg);
  118. tt_int_op(ret, OP_EQ, 0);
  119. tt_int_op(hs_version, OP_EQ, HS_VERSION_TWO);
  120. tt_assert(pk_ptr);
  121. tt_ptr_op(key_new_alg, OP_EQ, NULL);
  122. tt_ptr_op(key_new_blob, OP_EQ, NULL);
  123. tt_ptr_op(err_msg, OP_EQ, NULL);
  124. /* Test generating a invalid key type. */
  125. crypto_pk_free(pk_ptr); pk_ptr = NULL;
  126. ret = add_onion_helper_keyarg("NEW:RSA512", 0, &key_new_alg, &key_new_blob,
  127. &pk_ptr, &hs_version, &err_msg);
  128. tt_int_op(ret, OP_EQ, -1);
  129. tt_int_op(hs_version, OP_EQ, HS_VERSION_TWO);
  130. tt_ptr_op(pk_ptr, OP_EQ, NULL);
  131. tt_ptr_op(key_new_alg, OP_EQ, NULL);
  132. tt_ptr_op(key_new_blob, OP_EQ, NULL);
  133. tt_assert(err_msg);
  134. /* Test loading a RSA1024 key. */
  135. tor_free(err_msg);
  136. pk = pk_generate(0);
  137. tt_int_op(0, OP_EQ, crypto_pk_base64_encode(pk, &encoded));
  138. tor_asprintf(&arg_str, "RSA1024:%s", encoded);
  139. ret = add_onion_helper_keyarg(arg_str, 0, &key_new_alg, &key_new_blob,
  140. &pk_ptr, &hs_version, &err_msg);
  141. tt_int_op(ret, OP_EQ, 0);
  142. tt_int_op(hs_version, OP_EQ, HS_VERSION_TWO);
  143. tt_assert(pk_ptr);
  144. tt_ptr_op(key_new_alg, OP_EQ, NULL);
  145. tt_ptr_op(key_new_blob, OP_EQ, NULL);
  146. tt_ptr_op(err_msg, OP_EQ, NULL);
  147. tt_int_op(crypto_pk_cmp_keys(pk, pk_ptr), OP_EQ, 0);
  148. /* Test loading a invalid key type. */
  149. tor_free(arg_str);
  150. crypto_pk_free(pk); pk = NULL;
  151. crypto_pk_free(pk_ptr); pk_ptr = NULL;
  152. tor_asprintf(&arg_str, "RSA512:%s", encoded);
  153. ret = add_onion_helper_keyarg(arg_str, 0, &key_new_alg, &key_new_blob,
  154. &pk_ptr, &hs_version, &err_msg);
  155. tt_int_op(ret, OP_EQ, -1);
  156. tt_int_op(hs_version, OP_EQ, HS_VERSION_TWO);
  157. tt_ptr_op(pk_ptr, OP_EQ, NULL);
  158. tt_ptr_op(key_new_alg, OP_EQ, NULL);
  159. tt_ptr_op(key_new_blob, OP_EQ, NULL);
  160. tt_assert(err_msg);
  161. /* Test loading a invalid key. */
  162. tor_free(arg_str);
  163. crypto_pk_free(pk_ptr); pk_ptr = NULL;
  164. tor_free(err_msg);
  165. encoded[strlen(encoded)/2] = '\0';
  166. tor_asprintf(&arg_str, "RSA1024:%s", encoded);
  167. ret = add_onion_helper_keyarg(arg_str, 0, &key_new_alg, &key_new_blob,
  168. &pk_ptr, &hs_version, &err_msg);
  169. tt_int_op(ret, OP_EQ, -1);
  170. tt_int_op(hs_version, OP_EQ, HS_VERSION_TWO);
  171. tt_ptr_op(pk_ptr, OP_EQ, NULL);
  172. tt_ptr_op(key_new_alg, OP_EQ, NULL);
  173. tt_ptr_op(key_new_blob, OP_EQ, NULL);
  174. tt_assert(err_msg);
  175. done:
  176. crypto_pk_free(pk_ptr);
  177. tor_free(key_new_blob);
  178. tor_free(err_msg);
  179. tor_free(encoded);
  180. tor_free(arg_str);
  181. }
  182. static void
  183. test_getinfo_helper_onion(void *arg)
  184. {
  185. (void)arg;
  186. control_connection_t dummy;
  187. /* Get results out */
  188. char *answer = NULL;
  189. const char *errmsg = NULL;
  190. char *service_id = NULL;
  191. int rt = 0;
  192. dummy.ephemeral_onion_services = NULL;
  193. /* successfully get an empty answer */
  194. rt = getinfo_helper_onions(&dummy, "onions/current", &answer, &errmsg);
  195. tt_int_op(rt, OP_EQ, 0);
  196. tt_str_op(answer, OP_EQ, "");
  197. tor_free(answer);
  198. /* successfully get an empty answer */
  199. rt = getinfo_helper_onions(&dummy, "onions/detached", &answer, &errmsg);
  200. tt_int_op(rt, OP_EQ, 0);
  201. tt_str_op(answer, OP_EQ, "");
  202. tor_free(answer);
  203. /* get an answer for one onion service */
  204. service_id = tor_strdup("dummy_onion_id");
  205. dummy.ephemeral_onion_services = smartlist_new();
  206. smartlist_add(dummy.ephemeral_onion_services, service_id);
  207. rt = getinfo_helper_onions(&dummy, "onions/current", &answer, &errmsg);
  208. tt_int_op(rt, OP_EQ, 0);
  209. tt_str_op(answer, OP_EQ, "dummy_onion_id");
  210. done:
  211. tor_free(answer);
  212. tor_free(service_id);
  213. smartlist_free(dummy.ephemeral_onion_services);
  214. }
  215. static void
  216. test_rend_service_parse_port_config(void *arg)
  217. {
  218. const char *sep = ",";
  219. rend_service_port_config_t *cfg = NULL;
  220. char *err_msg = NULL;
  221. (void)arg;
  222. /* Test "VIRTPORT" only. */
  223. cfg = rend_service_parse_port_config("80", sep, &err_msg);
  224. tt_assert(cfg);
  225. tt_ptr_op(err_msg, OP_EQ, NULL);
  226. /* Test "VIRTPORT,TARGET" (Target is port). */
  227. rend_service_port_config_free(cfg);
  228. cfg = rend_service_parse_port_config("80,8080", sep, &err_msg);
  229. tt_assert(cfg);
  230. tt_ptr_op(err_msg, OP_EQ, NULL);
  231. /* Test "VIRTPORT,TARGET" (Target is IPv4:port). */
  232. rend_service_port_config_free(cfg);
  233. cfg = rend_service_parse_port_config("80,192.0.2.1:8080", sep, &err_msg);
  234. tt_assert(cfg);
  235. tt_ptr_op(err_msg, OP_EQ, NULL);
  236. /* Test "VIRTPORT,TARGET" (Target is IPv6:port). */
  237. rend_service_port_config_free(cfg);
  238. cfg = rend_service_parse_port_config("80,[2001:db8::1]:8080", sep, &err_msg);
  239. tt_assert(cfg);
  240. tt_ptr_op(err_msg, OP_EQ, NULL);
  241. rend_service_port_config_free(cfg);
  242. cfg = NULL;
  243. /* XXX: Someone should add tests for AF_UNIX targets if supported. */
  244. /* Test empty config. */
  245. rend_service_port_config_free(cfg);
  246. cfg = rend_service_parse_port_config("", sep, &err_msg);
  247. tt_ptr_op(cfg, OP_EQ, NULL);
  248. tt_assert(err_msg);
  249. /* Test invalid port. */
  250. tor_free(err_msg);
  251. cfg = rend_service_parse_port_config("90001", sep, &err_msg);
  252. tt_ptr_op(cfg, OP_EQ, NULL);
  253. tt_assert(err_msg);
  254. tor_free(err_msg);
  255. /* unix port */
  256. cfg = NULL;
  257. /* quoted unix port */
  258. tor_free(err_msg);
  259. cfg = rend_service_parse_port_config("100 unix:\"/tmp/foo bar\"",
  260. " ", &err_msg);
  261. tt_assert(cfg);
  262. tt_ptr_op(err_msg, OP_EQ, NULL);
  263. rend_service_port_config_free(cfg);
  264. cfg = NULL;
  265. /* quoted unix port */
  266. tor_free(err_msg);
  267. cfg = rend_service_parse_port_config("100 unix:\"/tmp/foo bar\"",
  268. " ", &err_msg);
  269. tt_assert(cfg);
  270. tt_ptr_op(err_msg, OP_EQ, NULL);
  271. rend_service_port_config_free(cfg);
  272. cfg = NULL;
  273. /* quoted unix port, missing end quote */
  274. cfg = rend_service_parse_port_config("100 unix:\"/tmp/foo bar",
  275. " ", &err_msg);
  276. tt_ptr_op(cfg, OP_EQ, NULL);
  277. tt_str_op(err_msg, OP_EQ, "Couldn't process address <unix:\"/tmp/foo bar> "
  278. "from hidden service configuration");
  279. tor_free(err_msg);
  280. /* bogus IP address */
  281. MOCK(tor_addr_lookup, mock_tor_addr_lookup__fail_on_bad_addrs);
  282. cfg = rend_service_parse_port_config("100 foo!!.example.com:9000",
  283. " ", &err_msg);
  284. UNMOCK(tor_addr_lookup);
  285. tt_ptr_op(cfg, OP_EQ, NULL);
  286. tt_str_op(err_msg, OP_EQ, "Unparseable address in hidden service port "
  287. "configuration.");
  288. tor_free(err_msg);
  289. /* bogus port port */
  290. cfg = rend_service_parse_port_config("100 99999",
  291. " ", &err_msg);
  292. tt_ptr_op(cfg, OP_EQ, NULL);
  293. tt_str_op(err_msg, OP_EQ, "Unparseable or out-of-range port \"99999\" "
  294. "in hidden service port configuration.");
  295. tor_free(err_msg);
  296. done:
  297. rend_service_port_config_free(cfg);
  298. tor_free(err_msg);
  299. }
  300. static void
  301. test_add_onion_helper_clientauth(void *arg)
  302. {
  303. rend_authorized_client_t *client = NULL;
  304. char *err_msg = NULL;
  305. int created = 0;
  306. (void)arg;
  307. /* Test "ClientName" only. */
  308. client = add_onion_helper_clientauth("alice", &created, &err_msg);
  309. tt_assert(client);
  310. tt_assert(created);
  311. tt_ptr_op(err_msg, OP_EQ, NULL);
  312. rend_authorized_client_free(client);
  313. /* Test "ClientName:Blob" */
  314. client = add_onion_helper_clientauth("alice:475hGBHPlq7Mc0cRZitK/B",
  315. &created, &err_msg);
  316. tt_assert(client);
  317. tt_assert(!created);
  318. tt_ptr_op(err_msg, OP_EQ, NULL);
  319. rend_authorized_client_free(client);
  320. /* Test invalid client names */
  321. client = add_onion_helper_clientauth("no*asterisks*allowed", &created,
  322. &err_msg);
  323. tt_ptr_op(client, OP_EQ, NULL);
  324. tt_assert(err_msg);
  325. tor_free(err_msg);
  326. /* Test invalid auth cookie */
  327. client = add_onion_helper_clientauth("alice:12345", &created, &err_msg);
  328. tt_ptr_op(client, OP_EQ, NULL);
  329. tt_assert(err_msg);
  330. tor_free(err_msg);
  331. /* Test invalid syntax */
  332. client = add_onion_helper_clientauth(":475hGBHPlq7Mc0cRZitK/B", &created,
  333. &err_msg);
  334. tt_ptr_op(client, OP_EQ, NULL);
  335. tt_assert(err_msg);
  336. tor_free(err_msg);
  337. done:
  338. rend_authorized_client_free(client);
  339. tor_free(err_msg);
  340. }
  341. /* Mocks and data/variables used for GETINFO download status tests */
  342. static const download_status_t dl_status_default =
  343. { 0, 0, 0, DL_SCHED_CONSENSUS, DL_WANT_ANY_DIRSERVER,
  344. DL_SCHED_INCREMENT_FAILURE, DL_SCHED_RANDOM_EXPONENTIAL, 0, 0 };
  345. static download_status_t ns_dl_status[N_CONSENSUS_FLAVORS];
  346. static download_status_t ns_dl_status_bootstrap[N_CONSENSUS_FLAVORS];
  347. static download_status_t ns_dl_status_running[N_CONSENSUS_FLAVORS];
  348. /*
  349. * These should explore all the possible cases of download_status_to_string()
  350. * in control.c
  351. */
  352. static const download_status_t dls_sample_1 =
  353. { 1467163900, 0, 0, DL_SCHED_GENERIC, DL_WANT_ANY_DIRSERVER,
  354. DL_SCHED_INCREMENT_FAILURE, DL_SCHED_DETERMINISTIC, 0, 0 };
  355. static const char * dls_sample_1_str =
  356. "next-attempt-at 2016-06-29 01:31:40\n"
  357. "n-download-failures 0\n"
  358. "n-download-attempts 0\n"
  359. "schedule DL_SCHED_GENERIC\n"
  360. "want-authority DL_WANT_ANY_DIRSERVER\n"
  361. "increment-on DL_SCHED_INCREMENT_FAILURE\n"
  362. "backoff DL_SCHED_DETERMINISTIC\n";
  363. static const download_status_t dls_sample_2 =
  364. { 1467164400, 1, 2, DL_SCHED_CONSENSUS, DL_WANT_AUTHORITY,
  365. DL_SCHED_INCREMENT_FAILURE, DL_SCHED_DETERMINISTIC, 0, 0 };
  366. static const char * dls_sample_2_str =
  367. "next-attempt-at 2016-06-29 01:40:00\n"
  368. "n-download-failures 1\n"
  369. "n-download-attempts 2\n"
  370. "schedule DL_SCHED_CONSENSUS\n"
  371. "want-authority DL_WANT_AUTHORITY\n"
  372. "increment-on DL_SCHED_INCREMENT_FAILURE\n"
  373. "backoff DL_SCHED_DETERMINISTIC\n";
  374. static const download_status_t dls_sample_3 =
  375. { 1467154400, 12, 25, DL_SCHED_BRIDGE, DL_WANT_ANY_DIRSERVER,
  376. DL_SCHED_INCREMENT_ATTEMPT, DL_SCHED_DETERMINISTIC, 0, 0 };
  377. static const char * dls_sample_3_str =
  378. "next-attempt-at 2016-06-28 22:53:20\n"
  379. "n-download-failures 12\n"
  380. "n-download-attempts 25\n"
  381. "schedule DL_SCHED_BRIDGE\n"
  382. "want-authority DL_WANT_ANY_DIRSERVER\n"
  383. "increment-on DL_SCHED_INCREMENT_ATTEMPT\n"
  384. "backoff DL_SCHED_DETERMINISTIC\n";
  385. static const download_status_t dls_sample_4 =
  386. { 1467166600, 3, 0, DL_SCHED_GENERIC, DL_WANT_ANY_DIRSERVER,
  387. DL_SCHED_INCREMENT_FAILURE, DL_SCHED_RANDOM_EXPONENTIAL, 0, 0 };
  388. static const char * dls_sample_4_str =
  389. "next-attempt-at 2016-06-29 02:16:40\n"
  390. "n-download-failures 3\n"
  391. "n-download-attempts 0\n"
  392. "schedule DL_SCHED_GENERIC\n"
  393. "want-authority DL_WANT_ANY_DIRSERVER\n"
  394. "increment-on DL_SCHED_INCREMENT_FAILURE\n"
  395. "backoff DL_SCHED_RANDOM_EXPONENTIAL\n"
  396. "last-backoff-position 0\n"
  397. "last-delay-used 0\n";
  398. static const download_status_t dls_sample_5 =
  399. { 1467164600, 3, 7, DL_SCHED_CONSENSUS, DL_WANT_ANY_DIRSERVER,
  400. DL_SCHED_INCREMENT_FAILURE, DL_SCHED_RANDOM_EXPONENTIAL, 1, 2112, };
  401. static const char * dls_sample_5_str =
  402. "next-attempt-at 2016-06-29 01:43:20\n"
  403. "n-download-failures 3\n"
  404. "n-download-attempts 7\n"
  405. "schedule DL_SCHED_CONSENSUS\n"
  406. "want-authority DL_WANT_ANY_DIRSERVER\n"
  407. "increment-on DL_SCHED_INCREMENT_FAILURE\n"
  408. "backoff DL_SCHED_RANDOM_EXPONENTIAL\n"
  409. "last-backoff-position 1\n"
  410. "last-delay-used 2112\n";
  411. static const download_status_t dls_sample_6 =
  412. { 1467164200, 4, 9, DL_SCHED_CONSENSUS, DL_WANT_AUTHORITY,
  413. DL_SCHED_INCREMENT_ATTEMPT, DL_SCHED_RANDOM_EXPONENTIAL, 3, 432 };
  414. static const char * dls_sample_6_str =
  415. "next-attempt-at 2016-06-29 01:36:40\n"
  416. "n-download-failures 4\n"
  417. "n-download-attempts 9\n"
  418. "schedule DL_SCHED_CONSENSUS\n"
  419. "want-authority DL_WANT_AUTHORITY\n"
  420. "increment-on DL_SCHED_INCREMENT_ATTEMPT\n"
  421. "backoff DL_SCHED_RANDOM_EXPONENTIAL\n"
  422. "last-backoff-position 3\n"
  423. "last-delay-used 432\n";
  424. /* Simulated auth certs */
  425. static const char *auth_id_digest_1_str =
  426. "63CDD326DFEF0CA020BDD3FEB45A3286FE13A061";
  427. static download_status_t auth_def_cert_download_status_1;
  428. static const char *auth_id_digest_2_str =
  429. "2C209FCDD8D48DC049777B8DC2C0F94A0408BE99";
  430. static download_status_t auth_def_cert_download_status_2;
  431. /* Expected form of digest list returned for GETINFO downloads/cert/fps */
  432. static const char *auth_id_digest_expected_list =
  433. "63CDD326DFEF0CA020BDD3FEB45A3286FE13A061\n"
  434. "2C209FCDD8D48DC049777B8DC2C0F94A0408BE99\n";
  435. /* Signing keys for simulated auth 1 */
  436. static const char *auth_1_sk_1_str =
  437. "AA69566029B1F023BA09451B8F1B10952384EB58";
  438. static download_status_t auth_1_sk_1_dls;
  439. static const char *auth_1_sk_2_str =
  440. "710865C7F06B73C5292695A8C34F1C94F769FF72";
  441. static download_status_t auth_1_sk_2_dls;
  442. /*
  443. * Expected form of sk digest list for
  444. * GETINFO downloads/cert/<auth_id_digest_1_str>/sks
  445. */
  446. static const char *auth_1_sk_digest_expected_list =
  447. "AA69566029B1F023BA09451B8F1B10952384EB58\n"
  448. "710865C7F06B73C5292695A8C34F1C94F769FF72\n";
  449. /* Signing keys for simulated auth 2 */
  450. static const char *auth_2_sk_1_str =
  451. "4299047E00D070AD6703FE00BE7AA756DB061E62";
  452. static download_status_t auth_2_sk_1_dls;
  453. static const char *auth_2_sk_2_str =
  454. "9451B8F1B10952384EB58B5F230C0BB701626C9B";
  455. static download_status_t auth_2_sk_2_dls;
  456. /*
  457. * Expected form of sk digest list for
  458. * GETINFO downloads/cert/<auth_id_digest_2_str>/sks
  459. */
  460. static const char *auth_2_sk_digest_expected_list =
  461. "4299047E00D070AD6703FE00BE7AA756DB061E62\n"
  462. "9451B8F1B10952384EB58B5F230C0BB701626C9B\n";
  463. /* Simulated router descriptor digests or bridge identity digests */
  464. static const char *descbr_digest_1_str =
  465. "616408544C7345822696074A1A3DFA16AB381CBD";
  466. static download_status_t descbr_digest_1_dl;
  467. static const char *descbr_digest_2_str =
  468. "06E8067246967265DBCB6641631B530EFEC12DC3";
  469. static download_status_t descbr_digest_2_dl;
  470. /* Expected form of digest list returned for GETINFO downloads/desc/descs */
  471. static const char *descbr_expected_list =
  472. "616408544C7345822696074A1A3DFA16AB381CBD\n"
  473. "06E8067246967265DBCB6641631B530EFEC12DC3\n";
  474. /*
  475. * Flag to make all descbr queries fail, to simulate not being
  476. * configured such that such queries make sense.
  477. */
  478. static int disable_descbr = 0;
  479. static void
  480. reset_mocked_dl_statuses(void)
  481. {
  482. int i;
  483. for (i = 0; i < N_CONSENSUS_FLAVORS; ++i) {
  484. memcpy(&(ns_dl_status[i]), &dl_status_default,
  485. sizeof(download_status_t));
  486. memcpy(&(ns_dl_status_bootstrap[i]), &dl_status_default,
  487. sizeof(download_status_t));
  488. memcpy(&(ns_dl_status_running[i]), &dl_status_default,
  489. sizeof(download_status_t));
  490. }
  491. memcpy(&auth_def_cert_download_status_1, &dl_status_default,
  492. sizeof(download_status_t));
  493. memcpy(&auth_def_cert_download_status_2, &dl_status_default,
  494. sizeof(download_status_t));
  495. memcpy(&auth_1_sk_1_dls, &dl_status_default,
  496. sizeof(download_status_t));
  497. memcpy(&auth_1_sk_2_dls, &dl_status_default,
  498. sizeof(download_status_t));
  499. memcpy(&auth_2_sk_1_dls, &dl_status_default,
  500. sizeof(download_status_t));
  501. memcpy(&auth_2_sk_2_dls, &dl_status_default,
  502. sizeof(download_status_t));
  503. memcpy(&descbr_digest_1_dl, &dl_status_default,
  504. sizeof(download_status_t));
  505. memcpy(&descbr_digest_2_dl, &dl_status_default,
  506. sizeof(download_status_t));
  507. }
  508. static download_status_t *
  509. ns_dl_status_mock(consensus_flavor_t flavor)
  510. {
  511. return &(ns_dl_status[flavor]);
  512. }
  513. static download_status_t *
  514. ns_dl_status_bootstrap_mock(consensus_flavor_t flavor)
  515. {
  516. return &(ns_dl_status_bootstrap[flavor]);
  517. }
  518. static download_status_t *
  519. ns_dl_status_running_mock(consensus_flavor_t flavor)
  520. {
  521. return &(ns_dl_status_running[flavor]);
  522. }
  523. static void
  524. setup_ns_mocks(void)
  525. {
  526. MOCK(networkstatus_get_dl_status_by_flavor, ns_dl_status_mock);
  527. MOCK(networkstatus_get_dl_status_by_flavor_bootstrap,
  528. ns_dl_status_bootstrap_mock);
  529. MOCK(networkstatus_get_dl_status_by_flavor_running,
  530. ns_dl_status_running_mock);
  531. reset_mocked_dl_statuses();
  532. }
  533. static void
  534. clear_ns_mocks(void)
  535. {
  536. UNMOCK(networkstatus_get_dl_status_by_flavor);
  537. UNMOCK(networkstatus_get_dl_status_by_flavor_bootstrap);
  538. UNMOCK(networkstatus_get_dl_status_by_flavor_running);
  539. }
  540. static smartlist_t *
  541. cert_dl_status_auth_ids_mock(void)
  542. {
  543. char digest[DIGEST_LEN], *tmp;
  544. int len;
  545. smartlist_t *list = NULL;
  546. /* Just pretend we have only the two hard-coded digests listed above */
  547. list = smartlist_new();
  548. len = base16_decode(digest, DIGEST_LEN,
  549. auth_id_digest_1_str, strlen(auth_id_digest_1_str));
  550. tt_int_op(len, OP_EQ, DIGEST_LEN);
  551. tmp = tor_malloc(DIGEST_LEN);
  552. memcpy(tmp, digest, DIGEST_LEN);
  553. smartlist_add(list, tmp);
  554. len = base16_decode(digest, DIGEST_LEN,
  555. auth_id_digest_2_str, strlen(auth_id_digest_2_str));
  556. tt_int_op(len, OP_EQ, DIGEST_LEN);
  557. tmp = tor_malloc(DIGEST_LEN);
  558. memcpy(tmp, digest, DIGEST_LEN);
  559. smartlist_add(list, tmp);
  560. done:
  561. return list;
  562. }
  563. static download_status_t *
  564. cert_dl_status_def_for_auth_mock(const char *digest)
  565. {
  566. download_status_t *dl = NULL;
  567. char digest_str[HEX_DIGEST_LEN+1];
  568. tt_ptr_op(digest, OP_NE, NULL);
  569. base16_encode(digest_str, HEX_DIGEST_LEN + 1,
  570. digest, DIGEST_LEN);
  571. digest_str[HEX_DIGEST_LEN] = '\0';
  572. if (strcmp(digest_str, auth_id_digest_1_str) == 0) {
  573. dl = &auth_def_cert_download_status_1;
  574. } else if (strcmp(digest_str, auth_id_digest_2_str) == 0) {
  575. dl = &auth_def_cert_download_status_2;
  576. }
  577. done:
  578. return dl;
  579. }
  580. static smartlist_t *
  581. cert_dl_status_sks_for_auth_id_mock(const char *digest)
  582. {
  583. smartlist_t *list = NULL;
  584. char sk[DIGEST_LEN];
  585. char digest_str[HEX_DIGEST_LEN+1];
  586. char *tmp;
  587. int len;
  588. tt_ptr_op(digest, OP_NE, NULL);
  589. base16_encode(digest_str, HEX_DIGEST_LEN + 1,
  590. digest, DIGEST_LEN);
  591. digest_str[HEX_DIGEST_LEN] = '\0';
  592. /*
  593. * Build a list of two hard-coded digests, depending on what we
  594. * were just passed.
  595. */
  596. if (strcmp(digest_str, auth_id_digest_1_str) == 0) {
  597. list = smartlist_new();
  598. len = base16_decode(sk, DIGEST_LEN,
  599. auth_1_sk_1_str, strlen(auth_1_sk_1_str));
  600. tt_int_op(len, OP_EQ, DIGEST_LEN);
  601. tmp = tor_malloc(DIGEST_LEN);
  602. memcpy(tmp, sk, DIGEST_LEN);
  603. smartlist_add(list, tmp);
  604. len = base16_decode(sk, DIGEST_LEN,
  605. auth_1_sk_2_str, strlen(auth_1_sk_2_str));
  606. tt_int_op(len, OP_EQ, DIGEST_LEN);
  607. tmp = tor_malloc(DIGEST_LEN);
  608. memcpy(tmp, sk, DIGEST_LEN);
  609. smartlist_add(list, tmp);
  610. } else if (strcmp(digest_str, auth_id_digest_2_str) == 0) {
  611. list = smartlist_new();
  612. len = base16_decode(sk, DIGEST_LEN,
  613. auth_2_sk_1_str, strlen(auth_2_sk_1_str));
  614. tt_int_op(len, OP_EQ, DIGEST_LEN);
  615. tmp = tor_malloc(DIGEST_LEN);
  616. memcpy(tmp, sk, DIGEST_LEN);
  617. smartlist_add(list, tmp);
  618. len = base16_decode(sk, DIGEST_LEN,
  619. auth_2_sk_2_str, strlen(auth_2_sk_2_str));
  620. tt_int_op(len, OP_EQ, DIGEST_LEN);
  621. tmp = tor_malloc(DIGEST_LEN);
  622. memcpy(tmp, sk, DIGEST_LEN);
  623. smartlist_add(list, tmp);
  624. }
  625. done:
  626. return list;
  627. }
  628. static download_status_t *
  629. cert_dl_status_fp_sk_mock(const char *fp_digest, const char *sk_digest)
  630. {
  631. download_status_t *dl = NULL;
  632. char fp_digest_str[HEX_DIGEST_LEN+1], sk_digest_str[HEX_DIGEST_LEN+1];
  633. /*
  634. * Unpack the digests so we can compare them and figure out which
  635. * dl status we want.
  636. */
  637. tt_ptr_op(fp_digest, OP_NE, NULL);
  638. base16_encode(fp_digest_str, HEX_DIGEST_LEN + 1,
  639. fp_digest, DIGEST_LEN);
  640. fp_digest_str[HEX_DIGEST_LEN] = '\0';
  641. tt_ptr_op(sk_digest, OP_NE, NULL);
  642. base16_encode(sk_digest_str, HEX_DIGEST_LEN + 1,
  643. sk_digest, DIGEST_LEN);
  644. sk_digest_str[HEX_DIGEST_LEN] = '\0';
  645. if (strcmp(fp_digest_str, auth_id_digest_1_str) == 0) {
  646. if (strcmp(sk_digest_str, auth_1_sk_1_str) == 0) {
  647. dl = &auth_1_sk_1_dls;
  648. } else if (strcmp(sk_digest_str, auth_1_sk_2_str) == 0) {
  649. dl = &auth_1_sk_2_dls;
  650. }
  651. } else if (strcmp(fp_digest_str, auth_id_digest_2_str) == 0) {
  652. if (strcmp(sk_digest_str, auth_2_sk_1_str) == 0) {
  653. dl = &auth_2_sk_1_dls;
  654. } else if (strcmp(sk_digest_str, auth_2_sk_2_str) == 0) {
  655. dl = &auth_2_sk_2_dls;
  656. }
  657. }
  658. done:
  659. return dl;
  660. }
  661. static void
  662. setup_cert_mocks(void)
  663. {
  664. MOCK(list_authority_ids_with_downloads, cert_dl_status_auth_ids_mock);
  665. MOCK(id_only_download_status_for_authority_id,
  666. cert_dl_status_def_for_auth_mock);
  667. MOCK(list_sk_digests_for_authority_id,
  668. cert_dl_status_sks_for_auth_id_mock);
  669. MOCK(download_status_for_authority_id_and_sk,
  670. cert_dl_status_fp_sk_mock);
  671. reset_mocked_dl_statuses();
  672. }
  673. static void
  674. clear_cert_mocks(void)
  675. {
  676. UNMOCK(list_authority_ids_with_downloads);
  677. UNMOCK(id_only_download_status_for_authority_id);
  678. UNMOCK(list_sk_digests_for_authority_id);
  679. UNMOCK(download_status_for_authority_id_and_sk);
  680. }
  681. static smartlist_t *
  682. descbr_get_digests_mock(void)
  683. {
  684. char digest[DIGEST_LEN], *tmp;
  685. int len;
  686. smartlist_t *list = NULL;
  687. if (!disable_descbr) {
  688. /* Just pretend we have only the two hard-coded digests listed above */
  689. list = smartlist_new();
  690. len = base16_decode(digest, DIGEST_LEN,
  691. descbr_digest_1_str, strlen(descbr_digest_1_str));
  692. tt_int_op(len, OP_EQ, DIGEST_LEN);
  693. tmp = tor_malloc(DIGEST_LEN);
  694. memcpy(tmp, digest, DIGEST_LEN);
  695. smartlist_add(list, tmp);
  696. len = base16_decode(digest, DIGEST_LEN,
  697. descbr_digest_2_str, strlen(descbr_digest_2_str));
  698. tt_int_op(len, OP_EQ, DIGEST_LEN);
  699. tmp = tor_malloc(DIGEST_LEN);
  700. memcpy(tmp, digest, DIGEST_LEN);
  701. smartlist_add(list, tmp);
  702. }
  703. done:
  704. return list;
  705. }
  706. static download_status_t *
  707. descbr_get_dl_by_digest_mock(const char *digest)
  708. {
  709. download_status_t *dl = NULL;
  710. char digest_str[HEX_DIGEST_LEN+1];
  711. if (!disable_descbr) {
  712. tt_ptr_op(digest, OP_NE, NULL);
  713. base16_encode(digest_str, HEX_DIGEST_LEN + 1,
  714. digest, DIGEST_LEN);
  715. digest_str[HEX_DIGEST_LEN] = '\0';
  716. if (strcmp(digest_str, descbr_digest_1_str) == 0) {
  717. dl = &descbr_digest_1_dl;
  718. } else if (strcmp(digest_str, descbr_digest_2_str) == 0) {
  719. dl = &descbr_digest_2_dl;
  720. }
  721. }
  722. done:
  723. return dl;
  724. }
  725. static void
  726. setup_desc_mocks(void)
  727. {
  728. MOCK(router_get_descriptor_digests,
  729. descbr_get_digests_mock);
  730. MOCK(router_get_dl_status_by_descriptor_digest,
  731. descbr_get_dl_by_digest_mock);
  732. reset_mocked_dl_statuses();
  733. }
  734. static void
  735. clear_desc_mocks(void)
  736. {
  737. UNMOCK(router_get_descriptor_digests);
  738. UNMOCK(router_get_dl_status_by_descriptor_digest);
  739. }
  740. static void
  741. setup_bridge_mocks(void)
  742. {
  743. disable_descbr = 0;
  744. MOCK(list_bridge_identities,
  745. descbr_get_digests_mock);
  746. MOCK(get_bridge_dl_status_by_id,
  747. descbr_get_dl_by_digest_mock);
  748. reset_mocked_dl_statuses();
  749. }
  750. static void
  751. clear_bridge_mocks(void)
  752. {
  753. UNMOCK(list_bridge_identities);
  754. UNMOCK(get_bridge_dl_status_by_id);
  755. disable_descbr = 0;
  756. }
  757. static void
  758. test_download_status_consensus(void *arg)
  759. {
  760. /* We just need one of these to pass, it doesn't matter what's in it */
  761. control_connection_t dummy;
  762. /* Get results out */
  763. char *answer = NULL;
  764. const char *errmsg = NULL;
  765. (void)arg;
  766. /* Check that the unknown prefix case works; no mocks needed yet */
  767. getinfo_helper_downloads(&dummy, "downloads/foo", &answer, &errmsg);
  768. tt_ptr_op(answer, OP_EQ, NULL);
  769. tt_str_op(errmsg, OP_EQ, "Unknown download status query");
  770. setup_ns_mocks();
  771. /*
  772. * Check returning serialized dlstatuses, and implicitly also test
  773. * download_status_to_string().
  774. */
  775. /* Case 1 default/FLAV_NS*/
  776. memcpy(&(ns_dl_status[FLAV_NS]), &dls_sample_1,
  777. sizeof(download_status_t));
  778. getinfo_helper_downloads(&dummy, "downloads/networkstatus/ns",
  779. &answer, &errmsg);
  780. tt_ptr_op(answer, OP_NE, NULL);
  781. tt_ptr_op(errmsg, OP_EQ, NULL);
  782. tt_str_op(answer, OP_EQ, dls_sample_1_str);
  783. tor_free(answer);
  784. errmsg = NULL;
  785. /* Case 2 default/FLAV_MICRODESC */
  786. memcpy(&(ns_dl_status[FLAV_MICRODESC]), &dls_sample_2,
  787. sizeof(download_status_t));
  788. getinfo_helper_downloads(&dummy, "downloads/networkstatus/microdesc",
  789. &answer, &errmsg);
  790. tt_ptr_op(answer, OP_NE, NULL);
  791. tt_ptr_op(errmsg, OP_EQ, NULL);
  792. tt_str_op(answer, OP_EQ, dls_sample_2_str);
  793. tor_free(answer);
  794. errmsg = NULL;
  795. /* Case 3 bootstrap/FLAV_NS */
  796. memcpy(&(ns_dl_status_bootstrap[FLAV_NS]), &dls_sample_3,
  797. sizeof(download_status_t));
  798. getinfo_helper_downloads(&dummy, "downloads/networkstatus/ns/bootstrap",
  799. &answer, &errmsg);
  800. tt_ptr_op(answer, OP_NE, NULL);
  801. tt_ptr_op(errmsg, OP_EQ, NULL);
  802. tt_str_op(answer, OP_EQ, dls_sample_3_str);
  803. tor_free(answer);
  804. errmsg = NULL;
  805. /* Case 4 bootstrap/FLAV_MICRODESC */
  806. memcpy(&(ns_dl_status_bootstrap[FLAV_MICRODESC]), &dls_sample_4,
  807. sizeof(download_status_t));
  808. getinfo_helper_downloads(&dummy,
  809. "downloads/networkstatus/microdesc/bootstrap",
  810. &answer, &errmsg);
  811. tt_ptr_op(answer, OP_NE, NULL);
  812. tt_ptr_op(errmsg, OP_EQ, NULL);
  813. tt_str_op(answer, OP_EQ, dls_sample_4_str);
  814. tor_free(answer);
  815. errmsg = NULL;
  816. /* Case 5 running/FLAV_NS */
  817. memcpy(&(ns_dl_status_running[FLAV_NS]), &dls_sample_5,
  818. sizeof(download_status_t));
  819. getinfo_helper_downloads(&dummy,
  820. "downloads/networkstatus/ns/running",
  821. &answer, &errmsg);
  822. tt_ptr_op(answer, OP_NE, NULL);
  823. tt_ptr_op(errmsg, OP_EQ, NULL);
  824. tt_str_op(answer, OP_EQ, dls_sample_5_str);
  825. tor_free(answer);
  826. errmsg = NULL;
  827. /* Case 6 running/FLAV_MICRODESC */
  828. memcpy(&(ns_dl_status_running[FLAV_MICRODESC]), &dls_sample_6,
  829. sizeof(download_status_t));
  830. getinfo_helper_downloads(&dummy,
  831. "downloads/networkstatus/microdesc/running",
  832. &answer, &errmsg);
  833. tt_ptr_op(answer, OP_NE, NULL);
  834. tt_ptr_op(errmsg, OP_EQ, NULL);
  835. tt_str_op(answer, OP_EQ, dls_sample_6_str);
  836. tor_free(answer);
  837. errmsg = NULL;
  838. /* Now check the error case */
  839. getinfo_helper_downloads(&dummy, "downloads/networkstatus/foo",
  840. &answer, &errmsg);
  841. tt_ptr_op(answer, OP_EQ, NULL);
  842. tt_ptr_op(errmsg, OP_NE, NULL);
  843. tt_str_op(errmsg, OP_EQ, "Unknown flavor");
  844. errmsg = NULL;
  845. done:
  846. clear_ns_mocks();
  847. tor_free(answer);
  848. return;
  849. }
  850. static void
  851. test_download_status_cert(void *arg)
  852. {
  853. /* We just need one of these to pass, it doesn't matter what's in it */
  854. control_connection_t dummy;
  855. /* Get results out */
  856. char *question = NULL;
  857. char *answer = NULL;
  858. const char *errmsg = NULL;
  859. (void)arg;
  860. setup_cert_mocks();
  861. /*
  862. * Check returning serialized dlstatuses and digest lists, and implicitly
  863. * also test download_status_to_string() and digest_list_to_string().
  864. */
  865. /* Case 1 - list of authority identity fingerprints */
  866. getinfo_helper_downloads(&dummy,
  867. "downloads/cert/fps",
  868. &answer, &errmsg);
  869. tt_ptr_op(answer, OP_NE, NULL);
  870. tt_ptr_op(errmsg, OP_EQ, NULL);
  871. tt_str_op(answer, OP_EQ, auth_id_digest_expected_list);
  872. tor_free(answer);
  873. errmsg = NULL;
  874. /* Case 2 - download status for default cert for 1st auth id */
  875. memcpy(&auth_def_cert_download_status_1, &dls_sample_1,
  876. sizeof(download_status_t));
  877. tor_asprintf(&question, "downloads/cert/fp/%s", auth_id_digest_1_str);
  878. tt_ptr_op(question, OP_NE, NULL);
  879. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  880. tt_ptr_op(answer, OP_NE, NULL);
  881. tt_ptr_op(errmsg, OP_EQ, NULL);
  882. tt_str_op(answer, OP_EQ, dls_sample_1_str);
  883. tor_free(question);
  884. tor_free(answer);
  885. errmsg = NULL;
  886. /* Case 3 - download status for default cert for 2nd auth id */
  887. memcpy(&auth_def_cert_download_status_2, &dls_sample_2,
  888. sizeof(download_status_t));
  889. tor_asprintf(&question, "downloads/cert/fp/%s", auth_id_digest_2_str);
  890. tt_ptr_op(question, OP_NE, NULL);
  891. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  892. tt_ptr_op(answer, OP_NE, NULL);
  893. tt_ptr_op(errmsg, OP_EQ, NULL);
  894. tt_str_op(answer, OP_EQ, dls_sample_2_str);
  895. tor_free(question);
  896. tor_free(answer);
  897. errmsg = NULL;
  898. /* Case 4 - list of signing key digests for 1st auth id */
  899. tor_asprintf(&question, "downloads/cert/fp/%s/sks", auth_id_digest_1_str);
  900. tt_ptr_op(question, OP_NE, NULL);
  901. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  902. tt_ptr_op(answer, OP_NE, NULL);
  903. tt_ptr_op(errmsg, OP_EQ, NULL);
  904. tt_str_op(answer, OP_EQ, auth_1_sk_digest_expected_list);
  905. tor_free(question);
  906. tor_free(answer);
  907. errmsg = NULL;
  908. /* Case 5 - list of signing key digests for 2nd auth id */
  909. tor_asprintf(&question, "downloads/cert/fp/%s/sks", auth_id_digest_2_str);
  910. tt_ptr_op(question, OP_NE, NULL);
  911. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  912. tt_ptr_op(answer, OP_NE, NULL);
  913. tt_ptr_op(errmsg, OP_EQ, NULL);
  914. tt_str_op(answer, OP_EQ, auth_2_sk_digest_expected_list);
  915. tor_free(question);
  916. tor_free(answer);
  917. errmsg = NULL;
  918. /* Case 6 - download status for 1st auth id, 1st sk */
  919. memcpy(&auth_1_sk_1_dls, &dls_sample_3,
  920. sizeof(download_status_t));
  921. tor_asprintf(&question, "downloads/cert/fp/%s/%s",
  922. auth_id_digest_1_str, auth_1_sk_1_str);
  923. tt_ptr_op(question, OP_NE, NULL);
  924. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  925. tt_ptr_op(answer, OP_NE, NULL);
  926. tt_ptr_op(errmsg, OP_EQ, NULL);
  927. tt_str_op(answer, OP_EQ, dls_sample_3_str);
  928. tor_free(question);
  929. tor_free(answer);
  930. errmsg = NULL;
  931. /* Case 7 - download status for 1st auth id, 2nd sk */
  932. memcpy(&auth_1_sk_2_dls, &dls_sample_4,
  933. sizeof(download_status_t));
  934. tor_asprintf(&question, "downloads/cert/fp/%s/%s",
  935. auth_id_digest_1_str, auth_1_sk_2_str);
  936. tt_ptr_op(question, OP_NE, NULL);
  937. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  938. tt_ptr_op(answer, OP_NE, NULL);
  939. tt_ptr_op(errmsg, OP_EQ, NULL);
  940. tt_str_op(answer, OP_EQ, dls_sample_4_str);
  941. tor_free(question);
  942. tor_free(answer);
  943. errmsg = NULL;
  944. /* Case 8 - download status for 2nd auth id, 1st sk */
  945. memcpy(&auth_2_sk_1_dls, &dls_sample_5,
  946. sizeof(download_status_t));
  947. tor_asprintf(&question, "downloads/cert/fp/%s/%s",
  948. auth_id_digest_2_str, auth_2_sk_1_str);
  949. tt_ptr_op(question, OP_NE, NULL);
  950. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  951. tt_ptr_op(answer, OP_NE, NULL);
  952. tt_ptr_op(errmsg, OP_EQ, NULL);
  953. tt_str_op(answer, OP_EQ, dls_sample_5_str);
  954. tor_free(question);
  955. tor_free(answer);
  956. errmsg = NULL;
  957. /* Case 9 - download status for 2nd auth id, 2nd sk */
  958. memcpy(&auth_2_sk_2_dls, &dls_sample_6,
  959. sizeof(download_status_t));
  960. tor_asprintf(&question, "downloads/cert/fp/%s/%s",
  961. auth_id_digest_2_str, auth_2_sk_2_str);
  962. tt_ptr_op(question, OP_NE, NULL);
  963. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  964. tt_ptr_op(answer, OP_NE, NULL);
  965. tt_ptr_op(errmsg, OP_EQ, NULL);
  966. tt_str_op(answer, OP_EQ, dls_sample_6_str);
  967. tor_free(question);
  968. tor_free(answer);
  969. errmsg = NULL;
  970. /* Now check the error cases */
  971. /* Case 1 - query is garbage after downloads/cert/ part */
  972. getinfo_helper_downloads(&dummy, "downloads/cert/blahdeblah",
  973. &answer, &errmsg);
  974. tt_ptr_op(answer, OP_EQ, NULL);
  975. tt_ptr_op(errmsg, OP_NE, NULL);
  976. tt_str_op(errmsg, OP_EQ, "Unknown certificate download status query");
  977. errmsg = NULL;
  978. /*
  979. * Case 2 - looks like downloads/cert/fp/<fp>, but <fp> isn't even
  980. * the right length for a digest.
  981. */
  982. getinfo_helper_downloads(&dummy, "downloads/cert/fp/2B1D36D32B2942406",
  983. &answer, &errmsg);
  984. tt_ptr_op(answer, OP_EQ, NULL);
  985. tt_ptr_op(errmsg, OP_NE, NULL);
  986. tt_str_op(errmsg, OP_EQ, "That didn't look like a digest");
  987. errmsg = NULL;
  988. /*
  989. * Case 3 - looks like downloads/cert/fp/<fp>, and <fp> is digest-sized,
  990. * but not parseable as one.
  991. */
  992. getinfo_helper_downloads(&dummy,
  993. "downloads/cert/fp/82F52AF55D250115FE44D3GC81D49643241D56A1",
  994. &answer, &errmsg);
  995. tt_ptr_op(answer, OP_EQ, NULL);
  996. tt_ptr_op(errmsg, OP_NE, NULL);
  997. tt_str_op(errmsg, OP_EQ, "That didn't look like a digest");
  998. errmsg = NULL;
  999. /*
  1000. * Case 4 - downloads/cert/fp/<fp>, and <fp> is not a known authority
  1001. * identity digest
  1002. */
  1003. getinfo_helper_downloads(&dummy,
  1004. "downloads/cert/fp/AC4F23B5745BDD2A77997B85B1FD85D05C2E0F61",
  1005. &answer, &errmsg);
  1006. tt_ptr_op(answer, OP_EQ, NULL);
  1007. tt_ptr_op(errmsg, OP_NE, NULL);
  1008. tt_str_op(errmsg, OP_EQ,
  1009. "Failed to get download status for this authority identity digest");
  1010. errmsg = NULL;
  1011. /*
  1012. * Case 5 - looks like downloads/cert/fp/<fp>/<anything>, but <fp> doesn't
  1013. * parse as a sensible digest.
  1014. */
  1015. getinfo_helper_downloads(&dummy,
  1016. "downloads/cert/fp/82F52AF55D250115FE44D3GC81D49643241D56A1/blah",
  1017. &answer, &errmsg);
  1018. tt_ptr_op(answer, OP_EQ, NULL);
  1019. tt_ptr_op(errmsg, OP_NE, NULL);
  1020. tt_str_op(errmsg, OP_EQ, "That didn't look like an identity digest");
  1021. errmsg = NULL;
  1022. /*
  1023. * Case 6 - looks like downloads/cert/fp/<fp>/<anything>, but <fp> doesn't
  1024. * parse as a sensible digest.
  1025. */
  1026. getinfo_helper_downloads(&dummy,
  1027. "downloads/cert/fp/82F52AF55D25/blah",
  1028. &answer, &errmsg);
  1029. tt_ptr_op(answer, OP_EQ, NULL);
  1030. tt_ptr_op(errmsg, OP_NE, NULL);
  1031. tt_str_op(errmsg, OP_EQ, "That didn't look like an identity digest");
  1032. errmsg = NULL;
  1033. /*
  1034. * Case 7 - downloads/cert/fp/<fp>/sks, and <fp> is not a known authority
  1035. * digest.
  1036. */
  1037. getinfo_helper_downloads(&dummy,
  1038. "downloads/cert/fp/AC4F23B5745BDD2A77997B85B1FD85D05C2E0F61/sks",
  1039. &answer, &errmsg);
  1040. tt_ptr_op(answer, OP_EQ, NULL);
  1041. tt_ptr_op(errmsg, OP_NE, NULL);
  1042. tt_str_op(errmsg, OP_EQ,
  1043. "Failed to get list of signing key digests for this authority "
  1044. "identity digest");
  1045. errmsg = NULL;
  1046. /*
  1047. * Case 8 - looks like downloads/cert/fp/<fp>/<sk>, but <sk> doesn't
  1048. * parse as a signing key digest.
  1049. */
  1050. getinfo_helper_downloads(&dummy,
  1051. "downloads/cert/fp/AC4F23B5745BDD2A77997B85B1FD85D05C2E0F61/"
  1052. "82F52AF55D250115FE44D3GC81D49643241D56A1",
  1053. &answer, &errmsg);
  1054. tt_ptr_op(answer, OP_EQ, NULL);
  1055. tt_ptr_op(errmsg, OP_NE, NULL);
  1056. tt_str_op(errmsg, OP_EQ, "That didn't look like a signing key digest");
  1057. errmsg = NULL;
  1058. /*
  1059. * Case 9 - looks like downloads/cert/fp/<fp>/<sk>, but <sk> doesn't
  1060. * parse as a signing key digest.
  1061. */
  1062. getinfo_helper_downloads(&dummy,
  1063. "downloads/cert/fp/AC4F23B5745BDD2A77997B85B1FD85D05C2E0F61/"
  1064. "82F52AF55D250115FE44D",
  1065. &answer, &errmsg);
  1066. tt_ptr_op(answer, OP_EQ, NULL);
  1067. tt_ptr_op(errmsg, OP_NE, NULL);
  1068. tt_str_op(errmsg, OP_EQ, "That didn't look like a signing key digest");
  1069. errmsg = NULL;
  1070. /*
  1071. * Case 10 - downloads/cert/fp/<fp>/<sk>, but <fp> isn't a known
  1072. * authority identity digest.
  1073. */
  1074. getinfo_helper_downloads(&dummy,
  1075. "downloads/cert/fp/C6B05DF332F74DB9A13498EE3BBC7AA2F69FCB45/"
  1076. "3A214FC21AE25B012C2ECCB5F4EC8A3602D0545D",
  1077. &answer, &errmsg);
  1078. tt_ptr_op(answer, OP_EQ, NULL);
  1079. tt_ptr_op(errmsg, OP_NE, NULL);
  1080. tt_str_op(errmsg, OP_EQ,
  1081. "Failed to get download status for this identity/"
  1082. "signing key digest pair");
  1083. errmsg = NULL;
  1084. /*
  1085. * Case 11 - downloads/cert/fp/<fp>/<sk>, but <sk> isn't a known
  1086. * signing key digest.
  1087. */
  1088. getinfo_helper_downloads(&dummy,
  1089. "downloads/cert/fp/63CDD326DFEF0CA020BDD3FEB45A3286FE13A061/"
  1090. "3A214FC21AE25B012C2ECCB5F4EC8A3602D0545D",
  1091. &answer, &errmsg);
  1092. tt_ptr_op(answer, OP_EQ, NULL);
  1093. tt_ptr_op(errmsg, OP_NE, NULL);
  1094. tt_str_op(errmsg, OP_EQ,
  1095. "Failed to get download status for this identity/"
  1096. "signing key digest pair");
  1097. errmsg = NULL;
  1098. /*
  1099. * Case 12 - downloads/cert/fp/<fp>/<sk>, but <sk> is on the list for
  1100. * a different authority identity digest.
  1101. */
  1102. getinfo_helper_downloads(&dummy,
  1103. "downloads/cert/fp/63CDD326DFEF0CA020BDD3FEB45A3286FE13A061/"
  1104. "9451B8F1B10952384EB58B5F230C0BB701626C9B",
  1105. &answer, &errmsg);
  1106. tt_ptr_op(answer, OP_EQ, NULL);
  1107. tt_ptr_op(errmsg, OP_NE, NULL);
  1108. tt_str_op(errmsg, OP_EQ,
  1109. "Failed to get download status for this identity/"
  1110. "signing key digest pair");
  1111. errmsg = NULL;
  1112. done:
  1113. clear_cert_mocks();
  1114. tor_free(answer);
  1115. return;
  1116. }
  1117. static void
  1118. test_download_status_desc(void *arg)
  1119. {
  1120. /* We just need one of these to pass, it doesn't matter what's in it */
  1121. control_connection_t dummy;
  1122. /* Get results out */
  1123. char *question = NULL;
  1124. char *answer = NULL;
  1125. const char *errmsg = NULL;
  1126. (void)arg;
  1127. setup_desc_mocks();
  1128. /*
  1129. * Check returning serialized dlstatuses and digest lists, and implicitly
  1130. * also test download_status_to_string() and digest_list_to_string().
  1131. */
  1132. /* Case 1 - list of router descriptor digests */
  1133. getinfo_helper_downloads(&dummy,
  1134. "downloads/desc/descs",
  1135. &answer, &errmsg);
  1136. tt_ptr_op(answer, OP_NE, NULL);
  1137. tt_ptr_op(errmsg, OP_EQ, NULL);
  1138. tt_str_op(answer, OP_EQ, descbr_expected_list);
  1139. tor_free(answer);
  1140. errmsg = NULL;
  1141. /* Case 2 - get download status for router descriptor 1 */
  1142. memcpy(&descbr_digest_1_dl, &dls_sample_1,
  1143. sizeof(download_status_t));
  1144. tor_asprintf(&question, "downloads/desc/%s", descbr_digest_1_str);
  1145. tt_ptr_op(question, OP_NE, NULL);
  1146. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  1147. tt_ptr_op(answer, OP_NE, NULL);
  1148. tt_ptr_op(errmsg, OP_EQ, NULL);
  1149. tt_str_op(answer, OP_EQ, dls_sample_1_str);
  1150. tor_free(question);
  1151. tor_free(answer);
  1152. errmsg = NULL;
  1153. /* Case 3 - get download status for router descriptor 1 */
  1154. memcpy(&descbr_digest_2_dl, &dls_sample_2,
  1155. sizeof(download_status_t));
  1156. tor_asprintf(&question, "downloads/desc/%s", descbr_digest_2_str);
  1157. tt_ptr_op(question, OP_NE, NULL);
  1158. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  1159. tt_ptr_op(answer, OP_NE, NULL);
  1160. tt_ptr_op(errmsg, OP_EQ, NULL);
  1161. tt_str_op(answer, OP_EQ, dls_sample_2_str);
  1162. tor_free(question);
  1163. tor_free(answer);
  1164. errmsg = NULL;
  1165. /* Now check the error cases */
  1166. /* Case 1 - non-digest-length garbage after downloads/desc */
  1167. getinfo_helper_downloads(&dummy, "downloads/desc/blahdeblah",
  1168. &answer, &errmsg);
  1169. tt_ptr_op(answer, OP_EQ, NULL);
  1170. tt_ptr_op(errmsg, OP_NE, NULL);
  1171. tt_str_op(errmsg, OP_EQ, "Unknown router descriptor download status query");
  1172. errmsg = NULL;
  1173. /* Case 2 - nonparseable digest-shaped thing */
  1174. getinfo_helper_downloads(
  1175. &dummy,
  1176. "downloads/desc/774EC52FD9A5B80A6FACZE536616E8022E3470AG",
  1177. &answer, &errmsg);
  1178. tt_ptr_op(answer, OP_EQ, NULL);
  1179. tt_ptr_op(errmsg, OP_NE, NULL);
  1180. tt_str_op(errmsg, OP_EQ, "That didn't look like a digest");
  1181. errmsg = NULL;
  1182. /* Case 3 - digest we have no descriptor for */
  1183. getinfo_helper_downloads(
  1184. &dummy,
  1185. "downloads/desc/B05B46135B0B2C04EBE1DD6A6AE4B12D7CD2226A",
  1186. &answer, &errmsg);
  1187. tt_ptr_op(answer, OP_EQ, NULL);
  1188. tt_ptr_op(errmsg, OP_NE, NULL);
  1189. tt_str_op(errmsg, OP_EQ, "No such descriptor digest found");
  1190. errmsg = NULL;
  1191. /* Case 4 - microdescs only */
  1192. disable_descbr = 1;
  1193. getinfo_helper_downloads(&dummy,
  1194. "downloads/desc/descs",
  1195. &answer, &errmsg);
  1196. tt_ptr_op(answer, OP_EQ, NULL);
  1197. tt_ptr_op(errmsg, OP_NE, NULL);
  1198. tt_str_op(errmsg, OP_EQ,
  1199. "We don't seem to have a networkstatus-flavored consensus");
  1200. errmsg = NULL;
  1201. disable_descbr = 0;
  1202. done:
  1203. clear_desc_mocks();
  1204. tor_free(answer);
  1205. return;
  1206. }
  1207. static void
  1208. test_download_status_bridge(void *arg)
  1209. {
  1210. /* We just need one of these to pass, it doesn't matter what's in it */
  1211. control_connection_t dummy;
  1212. /* Get results out */
  1213. char *question = NULL;
  1214. char *answer = NULL;
  1215. const char *errmsg = NULL;
  1216. (void)arg;
  1217. setup_bridge_mocks();
  1218. /*
  1219. * Check returning serialized dlstatuses and digest lists, and implicitly
  1220. * also test download_status_to_string() and digest_list_to_string().
  1221. */
  1222. /* Case 1 - list of bridge identity digests */
  1223. getinfo_helper_downloads(&dummy,
  1224. "downloads/bridge/bridges",
  1225. &answer, &errmsg);
  1226. tt_ptr_op(answer, OP_NE, NULL);
  1227. tt_ptr_op(errmsg, OP_EQ, NULL);
  1228. tt_str_op(answer, OP_EQ, descbr_expected_list);
  1229. tor_free(answer);
  1230. errmsg = NULL;
  1231. /* Case 2 - get download status for bridge descriptor 1 */
  1232. memcpy(&descbr_digest_1_dl, &dls_sample_3,
  1233. sizeof(download_status_t));
  1234. tor_asprintf(&question, "downloads/bridge/%s", descbr_digest_1_str);
  1235. tt_ptr_op(question, OP_NE, NULL);
  1236. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  1237. tt_ptr_op(answer, OP_NE, NULL);
  1238. tt_ptr_op(errmsg, OP_EQ, NULL);
  1239. tt_str_op(answer, OP_EQ, dls_sample_3_str);
  1240. tor_free(question);
  1241. tor_free(answer);
  1242. errmsg = NULL;
  1243. /* Case 3 - get download status for router descriptor 1 */
  1244. memcpy(&descbr_digest_2_dl, &dls_sample_4,
  1245. sizeof(download_status_t));
  1246. tor_asprintf(&question, "downloads/bridge/%s", descbr_digest_2_str);
  1247. tt_ptr_op(question, OP_NE, NULL);
  1248. getinfo_helper_downloads(&dummy, question, &answer, &errmsg);
  1249. tt_ptr_op(answer, OP_NE, NULL);
  1250. tt_ptr_op(errmsg, OP_EQ, NULL);
  1251. tt_str_op(answer, OP_EQ, dls_sample_4_str);
  1252. tor_free(question);
  1253. tor_free(answer);
  1254. errmsg = NULL;
  1255. /* Now check the error cases */
  1256. /* Case 1 - non-digest-length garbage after downloads/bridge */
  1257. getinfo_helper_downloads(&dummy, "downloads/bridge/blahdeblah",
  1258. &answer, &errmsg);
  1259. tt_ptr_op(answer, OP_EQ, NULL);
  1260. tt_ptr_op(errmsg, OP_NE, NULL);
  1261. tt_str_op(errmsg, OP_EQ, "Unknown bridge descriptor download status query");
  1262. errmsg = NULL;
  1263. /* Case 2 - nonparseable digest-shaped thing */
  1264. getinfo_helper_downloads(
  1265. &dummy,
  1266. "downloads/bridge/774EC52FD9A5B80A6FACZE536616E8022E3470AG",
  1267. &answer, &errmsg);
  1268. tt_ptr_op(answer, OP_EQ, NULL);
  1269. tt_ptr_op(errmsg, OP_NE, NULL);
  1270. tt_str_op(errmsg, OP_EQ, "That didn't look like a digest");
  1271. errmsg = NULL;
  1272. /* Case 3 - digest we have no descriptor for */
  1273. getinfo_helper_downloads(
  1274. &dummy,
  1275. "downloads/bridge/B05B46135B0B2C04EBE1DD6A6AE4B12D7CD2226A",
  1276. &answer, &errmsg);
  1277. tt_ptr_op(answer, OP_EQ, NULL);
  1278. tt_ptr_op(errmsg, OP_NE, NULL);
  1279. tt_str_op(errmsg, OP_EQ, "No such bridge identity digest found");
  1280. errmsg = NULL;
  1281. /* Case 4 - bridges disabled */
  1282. disable_descbr = 1;
  1283. getinfo_helper_downloads(&dummy,
  1284. "downloads/bridge/bridges",
  1285. &answer, &errmsg);
  1286. tt_ptr_op(answer, OP_EQ, NULL);
  1287. tt_ptr_op(errmsg, OP_NE, NULL);
  1288. tt_str_op(errmsg, OP_EQ, "We don't seem to be using bridges");
  1289. errmsg = NULL;
  1290. disable_descbr = 0;
  1291. done:
  1292. clear_bridge_mocks();
  1293. tor_free(answer);
  1294. return;
  1295. }
  1296. struct testcase_t controller_tests[] = {
  1297. { "add_onion_helper_keyarg_v2", test_add_onion_helper_keyarg_v2, 0,
  1298. NULL, NULL },
  1299. { "add_onion_helper_keyarg_v3", test_add_onion_helper_keyarg_v3, 0,
  1300. NULL, NULL },
  1301. { "getinfo_helper_onion", test_getinfo_helper_onion, 0, NULL, NULL },
  1302. { "rend_service_parse_port_config", test_rend_service_parse_port_config, 0,
  1303. NULL, NULL },
  1304. { "add_onion_helper_clientauth", test_add_onion_helper_clientauth, 0, NULL,
  1305. NULL },
  1306. { "download_status_consensus", test_download_status_consensus, 0, NULL,
  1307. NULL },
  1308. { "download_status_cert", test_download_status_cert, 0, NULL,
  1309. NULL },
  1310. { "download_status_desc", test_download_status_desc, 0, NULL, NULL },
  1311. { "download_status_bridge", test_download_status_bridge, 0, NULL, NULL },
  1312. END_OF_TESTCASES
  1313. };